K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39

Size: px
Start display at page:

Download "K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39"

Transcription

1 A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition 1 V.U.K. Sastry, 2 K. Anup Kumar 1 Director School of Computer Science and Informatics, Dean(R & D), Dean (Admin), Department of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Ghatkesar, Hyderabad, , Andhra Pradesh, India. 2 Associate Professor, Department of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Ghatkesar, Hyderabad, , Andhra Pradesh, India. 1 vuksastry@rediffmail.com and 2 k_anupkumar@yahoo.com Abstract: In this investigation, we have generalized the classical Feistel cipher by representing the plaintext in the form of a matrix instead of a binary string used in the case of classical Feistel cipher. In this, the plaintext matrix is divided into two matrices and one of these two is multiplied with the key matrix on both the sides. In the iteration process, involved in this cipher, we have included a pair of functions namely Mix ( ) and Permute ( ), and also utilized modular arithmetic addition. All these features are expected to strengthen the cipher. The avalanche effect and the cryptanalysis clearly show that the cipher is a potential one. Key words: Encryption, Decryption, Key matrix, Mix, Permute and Modular Arithmetic Addition. 1. Introduction In a recent investigation [1], we have developed a block cipher by generalizing the classical Feistel cipher wherein we have considered a plaintext which can be represented in the form of a pair of matrices instead of a pair of binary strings that was used in the case of classical Feistel cipher. In this development, we have used a key on both the sides of a portion of the plaintext matrix, and made use of iteration. In the iteration process we have included three additional features, namely, mixing, permutation and XOR operation. In this, we have seen that the strength of the cipher enhances quite significantly as all the three features, involved in the iteration process thoroughly modify the plaintext before it becomes the cipher text. The avalanche effect and the cryptanalysis discussed in this analysis effectively indicate that the cipher is a strong one. In the present paper, our objective is to modify the aforementioned block cipher by including modular arithmetic addition instead of the XOR operation, used in the previous analysis. The basic equations governing the encryption and the decryption of this cipher are given by = -1, (1.1) = ( (K - 1 K) ) mod N and -1 =, i = 1 to n, (1.2) -1 = ( - (K K) ) mod N i = n to 1, where, and are the plaintext matrices at the i th stage of the iteration, K the key matrix and N is a positive integer chosen appropriately. Here n denotes the number of iterations. In the development of this cipher, we have utilized the functions Mix ( ) and Permute ( ), utilized in the earlier analysis [1]. The present analysis can be considered as a development over the block cipher developed by Sastry et.al [2] in which we have included the additional features namely Mix ( ) and Permute ( ). In what follows, we present the plan of the paper. In section 2, we discuss the development of the cipher and present the flowcharts and the algorithms describing the cipher. Section 3 is devoted to an illustration of the cipher, and in this we have determined the avalanche effect. We have examined the cryptanalysis in section 4. Finally in 1 32

2 section 5, we have given the details of the computations and arrived at the conclusions. 2. Development of the cipher Consider a plaintext P consisting of 2m 2 characters. On employing the EBCIDIC code, the plaintext can be written in the form of a pair of square matrices P 0 and Q 0, wherein, each one is of size m. Let us consider a key matrix K, whose size is mxm. Read K, P In this cipher, the encryption and the decryption are governed by the relations (1.1) and (1.2) respectively. In what follows we present the flow charts and the algorithms describing the encryption and the decryption processes. In the flowchart, for the sake of elegance, we have written the functions Mix ( ) and Permute ( ), arising in encryption, as M ( ) and Φ ( ) respectively. The reverse processes represented by IMix ( ) and IPermute ( ), arising in decryption, are denoted by IM ( ) and IΦ ( ). Read C, K P 0 Q 0 P 16 Q 16-1 for i = 1 to n for i = n to 1 F =k -1 = IΦ ( ) = IΦ ( ) = mod N = IM ( ) = IM ( ) -1 = -1 F = M ( ) = M ( ) -1 = mod N = Φ ( ) = Φ ( ) -1 = -1-1, -1, -1 C = P 16 Q 16 In the matrices and, all the numbers are lying in the interval [0-255]. Here F = K -1 K. In this analysis, we have taken n =16. P = P 0 Q 0 Fig 2. The process of Decryption Fig 1. The process of Encryption 2 33

3 The processes of encryption and decryption depicted in the flow charts are described by the algorithms given below. Algorithm for Encryption 1. Read P, K, n and N. 2. P 0 = Left half of P. Q 0 = Right half of P. 3. for i = 1 to n begin = -1 F = ( K -1 K ) = ( -1 + F ) mod N = M ( ) = Φ ( ) = M ( ) = Φ ( ) end 4. C = P n Q n /* represents concatenation */ 5. Write(C) Algorithm for Decryption 1. Read C, K, n and N. 2. P n = Left half of C Q n = Right half of C 3. for i = n to 1 begin = IΦ ( ) = IM ( ) = IΦ ( ) = IM ( ) -1 = F = ( K K ) mod N -1 = ( - F ) mod N end 4. P = P 0 Q 0 /* represents concatenation */ 5. Write (P) Let us now see how the functions (1) Mix ( ) and (2) Permute ( ) can be developed. As we proceed with the iteration process, we come across a pair of square matrices of size m at each stage of the iteration process. Let us suppose that a square matrix of size m denoted by T can be written in the form T = [ T ij ], i = 1 to m, j = 1 to m. On representing each element of the matrix in its binary form we get a matrix of size mx8m. Considering 8 binary bits, at each instance, in a column wise manner and finding its decimal equivalent, we can represent the mx8m matrix as a square matrix of size m, by arranging the decimal numbers in a row wise manner. This has led to a through mixing of the binary bits related to the key and the plaintext. For a detailed discussion of this mixing process we may refer to [1]. Now Let us consider the development of the function Permute ( ). Let K be a square matrix of size m. We arrange the m 2 decimal numbers of K in ascending order, and find the position of each number by looking at the elements of the matrix in a row wise manner. This representation can be written in the form of a table given by m 2 L 1 L 2 L L m 2 Table 1. Correspondence between the elements of the matrix and their positions. 2 Here, L 1, L 2.. L m are the numbers denoting the positions of the elements in K. Consider the plaintext, represented in the form of a square matrix T of size m. On converting each element into its binary form, T can be written as a matrix of size mx8m. In this matrix, we go on interchanging the i th column with L i th column (without any unwanted interchanges) till we exhaust all the columns. Then, we convert the resulting plaintext matrix into its decimal form. Thus we get back an mxm matrix. This is the process of permutation. For a clear idea concerned to this permutation process, we may refer to [1]. 3. Illustration of Cipher Consider the plaintext given below. Dear friend, do not have any worry. I agree, we are thrown into side track. People call us as terrorists. Are we the terrorists? or are they the terrorists? Their fathers and forefathers earned millions and millions of rupees, and they became highly affluent and influential. They joined politics. They transformed the whole country with their outlook and to their advantage at all instances. We are no way inferior to them in ethical values. (3.1) 3 34

4 Let us focus our attention on the first 128 characters of the plaintext. This is given by Dear friend, do not have any worry. I agree, we are thrown into the side track. People call us as terrorists. Are we the terrorists? (3.2) On applying the EBCIDIC code we get, (3.3) (3.3) can be written in the form P 0 = (3.4) Q 0 = (3.5) Let us take the Key in the form K = (3.6)

5 On using (3.4) - (3.6) and the functions Mix( ) and Permute( ), we adopt the encryption algorithm, mentioned in section 2, and obtain the cipher text given by C = (3.7) On applying the decryption algorithm with the inputs (3.6), (3.7) and the functions IMix( ) and IPermute( ), we get back the original plaintext given by (3.3). Let us now examine the avalanche effect which indicates the strength of the cipher in a qualitative manner. To carry out this one, we change the first character of the plaintext (3.2) from D to E. As the EBCIDIC codes of these characters are 68 and 69, we have a change of one bit in the plaintext. On using the modified plaintext and the key (3.6), we apply the encryption algorithm, given in section 2, and obtain the new cipher text C in the form C = (3.8) On comparing (3.7) and (3.8) in their binary form, we find that they differ by 507 bits (out of 1024 bits). This shows that, the cipher is expected to be a strong one. 5 36

6 Let us now consider a one bit change in the key K given by (3.6). To this end, we change the 5 th row 4 th column element 222 to 223. This leads to a change of one binary bit the key. Now on using the original plaintext (3.3) and the modified key, as we have obtained here, we apply the encryption algorithm and obtain the cipher text C in the form C = (3.9) After converting (3.7) and ( 3.9 ) into their binary form and comparing them, we notice that they differ by 510 bits (out of 1024 bits). This result also firmly indicates that the cipher is a potential one. 4. Cryptanalysis The different types of Cryptanalytic attacks that are seen in the literature of cryptography [3] are 1. Cipher text only (Brute Force) attack. 2. Known Plaintext attack. 3. Chosen Plaintext attack. 4. Chosen Cipher text attack. In all these cryptanalytic attacks, the cipher text and the encryption algorithm are available to the attacker. Generally an algorithm is designed to withstand the first two attacks [ 3 ]. Let us now focus our attention on the brute force attack. In this cipher, as the key K is consisting of 512 bits, the size of the key space is = (2 10 ) 51.2 (10) Let us suppose that, the time required for the computation of the algorithm with one value of the key is 10-7 seconds. Then the total time required for the execution with all possible keys in the key space is (10) x x 24 x 60 x 60 As this number is very large, it is not at all possible to break the cipher with this attack. (10) x 3.12 x = 3.12 x (10) years 6 Now let us examine the known plaintext attack. In order to carry out this one, we know any as many pairs of plaintext and cipher text as we require for this purpose. In this cipher, as we have an iteration process which includes multiplication with the key on both the sides of a portion of the plaintext and the functions mix ( ) and permute ( ) for thoroughly shuffling the results, at each stage of the iteration process. It is totally impossible to determine the key or a function of the key which is required for breaking the cipher. Hence, this attack is an utter failure. In the cases 3 and 4, that is, in the chosen plaintext attack and in the chosen cipher text attack, the process of attack is expected to be very cumbersome, as the plaintext in the cipher is under going several operations. Hence we say that we do not find any scope for these attacks. From the above discussion, we conclude that the cipher is a strong one from the cryptanalytic point of view. 5. Computations and Conclusions In this paper, we have investigated a modified Feistel cipher which includes iteration and modular 37

7 arithmetic addition. In order to achieve through confusion and diffusion, this cipher involves a pair of functions, namely, mix ( ) and permute ( ) for creating diffusion and confusion. As these two characteristic features have mixed and scattered the binary bits of the plaintext and the key, at various stages of the iteration, the cipher is found to be a strong one. The programs required for encryption and decryption are written in C Language. In order to carry out the encryption of the entire plaintext, we divide the plaintext (3.1) into 4 blocks, wherein each one of the first three blocks contain 128 characters. As the last block is containing only 100 characters, we have included 28 blanks to make it a complete block of 128 characters. On adopting the encryption algorithm, with the necessary inputs, we have obtained the corresponding cipher text given below As the avalanche effect supports the cipher, and as the cryptanalysis clearly indicates that this cipher is a strong one, we conclude that this cipher is quite comparable with any other cipher in cryptography. It is interesting to note that this cipher can be made use of for the security of any amount of information. 7 38

8 5. References [1] V. U. K. Sastry, K. Anup Kumar, A Modified Feistel Cipher involving a key as a multiplicant on both the sides of the plaintext matrix and supplemented with Mixing, Permutation and XOR Operations ( Sent for Publication ) [2] V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani, A Block Cipher Involving a Key Applied on Both the Sides of the Plain Text, International Journal of Computer and Network Security (IJCNS), Vol.1, No. 1, pp , Oct [3] William Stallings, Cryptography and Network Security, Principles and Practice, Third Edition, Pearson, Authors profile: Dr. V. U. K. Sastry is presently working as Professor in the Dept. of Computer Science and Engineering (CSE), Director (SCSI), Dean (R & D), SreeNidhi Institute of Science and Technology (SNIST), Hyderabad, India. He was Formerly Professor in IIT, Kharagpur, India and Worked in IIT, Kharagpur during He guided 12 PhDs, and published more than 40 research papers in various international journals. His research interests are Network Security & Cryptography, Image Processing, Data Mining and Genetic Algorithms. Mr. K. Anup Kumar is presently working as an Associate Professor in the Department of Computer Science and Engineering, SNIST, Hyderabad India. He obtained his B.Tech (CSE) degree from JNTU Hyderabad, and done his M.Tech (CSE) from Osmania university, Hyderabad. He is now pursuing his PhD from JNTU, Hyderabad, India, under the supervision of Dr. V.U.K. Sastry in the area of Information Security and Cryptography. He has 10 years of teaching experience and his interest in research area includes, Cryptography, Steganography and Parallel Processing Systems. 8 39

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),

More information

A Block Cipher Involving A Key Matrix And A Key Bunch Matrix, Supplemented With Permutation

A Block Cipher Involving A Key Matrix And A Key Bunch Matrix, Supplemented With Permutation The International Journal of Engineering And Science (IJES) Volume 1 Issue Pages 4-4 1 ISSN: 3 13 ISBN: 3 A Block Cipher Involving A Key Matrix And A Key Bunch Matrix, Supplemented With Permutation 1,

More information

A Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix

A Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix Research Inventy: International Journal Of Engineering And Science Vol., Issue 9 (April 3), Pp - Issn(e): 7-47, Issn(p):-643, Www.Researchinventy.Com A Block Cipher Involving a Key Matrix a Key bunch Matrix,

More information

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key International Journal of Computer Networks and Security, ISSN:25-6878, Vol.23, Issue.2 7 Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and

More information

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition Journal of Computer Science 6 (2): 133-140, 2010 ISSN 1549-3636 2010 Science Publications Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition K. Anup Kumar and V.U.K.

More information

A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix

A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix IAENG International Journal of Computer Science, 32:4, IJCS_32_4_ A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix S. Udaya Kumar V. U. K.

More information

A Modified Playfair Cipher for a Large Block of Plaintext

A Modified Playfair Cipher for a Large Block of Plaintext International Journal of Computer Theory and Engineering, Vol 1, No 5, Decemer, 2009 A Modified layfair Cipher for a Large Block of laintext V Umakanta Sastry, N Ravi Shankar, and S Durga Bhavani Astract

More information

CHAPTER 13 CONCLUSIONS AND SCOPE FOR FUTURE WORK

CHAPTER 13 CONCLUSIONS AND SCOPE FOR FUTURE WORK 189 CHAPTER 13 CONCLUSIONS AND SCOPE FOR FUTURE WORK 190 13.1 Conclusions This thesis is devoted to the study of the following problems in cryptography and image processing. 1. A modified Feistel cipher

More information

A Block Cipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix

A Block Cipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix Journal of omputer Science 4 (): 7-4, 8 ISSN 549-3636 8 Science Publications A Block ipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix

More information

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Reversible Data Hiding in Encrypted Images with Private Key Cryptography Reversible Data Hiding in Encrypted Images with Private Key Cryptography Wajahath Hussain Razvi, Dr.Ch.Samson Abstract This project proposes a reversible scheme for cipher images which are encrypted using

More information

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Cryptographic Algorithms - AES

Cryptographic Algorithms - AES Areas for Discussion Cryptographic Algorithms - AES CNPA - Network Security Joseph Spring Department of Computer Science Advanced Encryption Standard 1 Motivation Contenders Finalists AES Design Feistel

More information

An Improved Run Length Encoding Scheme for Image Compression Ch.Samson 1, VUK Sastry 2

An Improved Run Length Encoding Scheme for Image Compression Ch.Samson 1, VUK Sastry 2 www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 3 March 2017, Page No. 20716-20720 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i3.57

More information

Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect

Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect 244 Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect Krishnamurthy G.N, Dr. V. Ramaswamy, Leela G.H and Ashalatha

More information

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using

More information

A.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.

A.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A. An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions Ravindra Babu Kallam Research Scholar, J.N.T.U,

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon Mungo had been working on Stern's code, principally with

More information

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái Cryptography and Network Security Block Ciphers + DES Lectured by Nguyễn Đức Thái Outline Block Cipher Principles Feistel Ciphers The Data Encryption Standard (DES) (Contents can be found in Chapter 3,

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES

More information

Symmetric Cryptography. Chapter 6

Symmetric Cryptography. Chapter 6 Symmetric Cryptography Chapter 6 Block vs Stream Ciphers Block ciphers process messages into blocks, each of which is then en/decrypted Like a substitution on very big characters 64-bits or more Stream

More information

Enhanced 3-D PLAYFAIR Cipher

Enhanced 3-D PLAYFAIR Cipher Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering

More information

Few Other Cryptanalytic Techniques

Few Other Cryptanalytic Techniques Few Other Cryptanalytic Techniques Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 Objectives Boomerang Attack

More information

Jordan University of Science and Technology

Jordan University of Science and Technology Jordan University of Science and Technology Cryptography and Network Security - CPE 542 Homework #III Handed to: Dr. Lo'ai Tawalbeh By: Ahmed Saleh Shatnawi 20012171020 On: 8/11/2005 Review Questions RQ3.3

More information

Block Encryption and DES

Block Encryption and DES Block Encryption and DES Plain Text Block 1 Block 2 Block 3 Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available

More information

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security Manas Paul 1 and Jyotsna Kumar Mandal 2 1 Dept. of Comp. Application, JIS College of Engineering,

More information

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322

More information

On the Design of Secure Block Ciphers

On the Design of Secure Block Ciphers On the Design of Secure Block Ciphers Howard M. Heys and Stafford E. Tavares Department of Electrical and Computer Engineering Queen s University Kingston, Ontario K7L 3N6 email: tavares@ee.queensu.ca

More information

Deciphering of Transposition Ciphers using Genetic Algorithm

Deciphering of Transposition Ciphers using Genetic Algorithm 41 Deciphering of Transposition Ciphers using Genetic Algorithm 1 Alok Singh Jadaun, 2 Vikas Chaudhary, 3 Lavkush Sharma, 4 Gajendra Pal Singh 1, 2 Department Of Computer Science & Engineering Bhagwant

More information

Chapter 3 Block Ciphers and the Data Encryption Standard

Chapter 3 Block Ciphers and the Data Encryption Standard Chapter 3 Block Ciphers and the Data Encryption Standard Last Chapter have considered: terminology classical cipher techniques substitution ciphers cryptanalysis using letter frequencies transposition

More information

Cryptography and Network Security Chapter 3. Modern Block Ciphers. Block vs Stream Ciphers. Block Cipher Principles

Cryptography and Network Security Chapter 3. Modern Block Ciphers. Block vs Stream Ciphers. Block Cipher Principles Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon Mungo had been working

More information

Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect

Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect 1 Aumreesh Saxena, 2 Sourabh Singh 1 Sagar Institute of Research Technology and Science, Bhopal, Madhya Pradesh

More information

Computer and Data Security. Lecture 3 Block cipher and DES

Computer and Data Security. Lecture 3 Block cipher and DES Computer and Data Security Lecture 3 Block cipher and DES Stream Ciphers l Encrypts a digital data stream one bit or one byte at a time l One time pad is example; but practical limitations l Typical approach

More information

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION V. Sumathy & C. Navaneethan Assistant Professor, Department of CSE, Kingston Engineering College, Vellore, Tamil Nadu, India ABSTRACT In this paper we present

More information

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The

More information

A SIMPLIFIED IDEA ALGORITHM

A SIMPLIFIED IDEA ALGORITHM A SIMPLIFIED IDEA ALGORITHM NICK HOFFMAN Abstract. In this paper, a simplified version of the International Data Encryption Algorithm (IDEA) is described. This simplified version, like simplified versions

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 6: Advanced Encryption Standard (AES) Ion Petre Department of IT, Åbo Akademi University 1 Origin of AES 1999: NIST

More information

Diversified Caesar Cipher for Impeccable Security

Diversified Caesar Cipher for Impeccable Security Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics

More information

Secret Key Cryptography

Secret Key Cryptography Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:

More information

Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack

Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack Vivek Kumar 1 and Sandeep Sharma 2 1,2 Department of Electronics and Communication Engineering, Dehradun Institute of Technology,

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

Content of this part

Content of this part UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 4 The Advanced Encryption Standard (AES) Israel Koren ECE597/697 Koren Part.4.1

More information

Block Ciphers and the Data Encryption Standard (DES) Modified by: Dr. Ramzi Saifan

Block Ciphers and the Data Encryption Standard (DES) Modified by: Dr. Ramzi Saifan Block Ciphers and the Data Encryption Standard (DES) Modified by: Dr. Ramzi Saifan Block ciphers Keyed, invertible Large key space, large block size A block of plaintext is treated as a whole and used

More information

New Kid on the Block Practical Construction of Block Ciphers. Table of contents

New Kid on the Block Practical Construction of Block Ciphers. Table of contents New Kid on the Block Practical Construction of Block Ciphers Foundations of Cryptography Computer Science Department Wellesley College Fall 2016 Table of contents Introduction Substitution-permutation

More information

P2_L6 Symmetric Encryption Page 1

P2_L6 Symmetric Encryption Page 1 P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Manikandan. G *1, Krishnan.G

More information

Design and Analysis of New Symmetric Block Cipher Algorithm

Design and Analysis of New Symmetric Block Cipher Algorithm Design and Analysis of New Symmetric Block Cipher Algorithm KALAICHELVI V && MANIMOZHI K Asst. Professor, SRC- SASTRA University, Kumbakonam, India E-mail: kalaichelvi2k@yahoo.com Abstract Cryptography

More information

Introduction to Cryptology Dr. Sugata Gangopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Roorkee

Introduction to Cryptology Dr. Sugata Gangopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Roorkee Introduction to Cryptology Dr. Sugata Gangopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Roorkee Lecture 09 Cryptanalysis and its variants, linear attack Welcome

More information

Symmetric Cryptography

Symmetric Cryptography CSE 484 (Winter 2010) Symmetric Cryptography Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

Science & Technology (DCRUST), Sonepat

Science & Technology (DCRUST), Sonepat A Hybrid Approach for Data Encryption and Hema Arora 1, Anil Arora 2 1 Department of Computer ScienceGateway Institute of Engineering & Technology (GIET), Deenbandhu Chhotu Ram University of Science &

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK MORE RANDOMNESS OF IMPROVED RC4 (IRC4) THAN ORIGINAL RC4 HEMANTA DEY 1, DR. UTTAM

More information

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24 Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable for authentication of sender Lecturers: Mark D. Ryan and David Galindo.

More information

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos A Survey On SecureImage Encryption Technique Using Blowfish And Chaos Romani Patel 1,Krunal Panchal 2 1 Research Scholar, Information Technology, L.J Institute Of Engineering And Technology, Ahmedabad,

More information

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of

More information

Proposing A Symmetric Key Bit-Level Block Cipher

Proposing A Symmetric Key Bit-Level Block Cipher Proposing A Symmetric Key Bit-Level Block Cipher Sarbajit Manna, Saurabh Dutta Abstract A novel bit level block cipher based symmetric key cryptographic technique using G.C.D is proposed in this research

More information

Symmetric Encryption Algorithms

Symmetric Encryption Algorithms Symmetric Encryption Algorithms CS-480b Dick Steflik Text Network Security Essentials Wm. Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik Symmetric Cipher Model Plaintext Encryption Algorithm

More information

Design Implementation of Composite Field S-Box using AES 256 Algorithm

Design Implementation of Composite Field S-Box using AES 256 Algorithm International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2016, PP 43-51 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Design Implementation of Composite Field

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 5 Advanced Encryption Standard Advance Encryption Standard Topics Origin of AES Basic AES Inside Algorithm Final Notes Origins

More information

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa ICT 6541 Applied Cryptography Hossen Asiful Mustafa Encryption & Decryption Key (K) Plaintext (P) Encrypt (E) Ciphertext (C) C = E K (P) Same Key (K) Ciphertext (C) Decrypt (D) Plaintext (P) P = D K (C)

More information

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas Introduction to Cryptography Lecture 3 Benny Pinkas page 1 1 Pseudo-random generator Pseudo-random generator seed output s G G(s) (random, s =n) Deterministic function of s, publicly known G(s) = 2n Distinguisher

More information

Blow-CAST-Fish: A New 64-bit Block Cipher

Blow-CAST-Fish: A New 64-bit Block Cipher 282 Blow-CAST-Fish: A New 64-bit Block Cipher Krishnamurthy G.N, Dr. V. Ramaswamy, Leela G.H and Ashalatha M.E Bapuji Institute of Engineering and Technology, Davangere-577004, Karnataka, India Summary:

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time

More information

Module 1: Classical Symmetric Ciphers

Module 1: Classical Symmetric Ciphers Module 1: Classical Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Introduction to Cryptography Terms and Concepts

More information

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition

More information

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos ECE596C: Handout #7 Analysis of DES and the AES Standard Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract. In this lecture we analyze the security properties of DES and

More information

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of

More information

Symmetric Key Cryptosystems. Definition

Symmetric Key Cryptosystems. Definition Symmetric Key Cryptosystems Debdeep Mukhopadhyay IIT Kharagpur Definition Alice and Bob has the same key to encrypt as well as to decrypt The key is shared via a secured channel Symmetric Ciphers are of

More information

Webpage: Volume 5, Issue VII, July 2017 ISSN

Webpage:   Volume 5, Issue VII, July 2017 ISSN Image Security using Non-Linear Data Structure Dr. S. Kiran 1, R. Pradeep Kumar Reddy 2, V. Siva Kumar 3, P. Veereshkumar Goud 4 1,2 Assistant Professor, 3,4 Student 1,2,3,,4 Dept. of CSE, YSR Engineering

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

MINIMIZATION OF DELAY TIME IN DYNAMIC ENCRYPTION ALGORITHM FOR REAL-TIME APPLICATIONS (DEA-RTA)

MINIMIZATION OF DELAY TIME IN DYNAMIC ENCRYPTION ALGORITHM FOR REAL-TIME APPLICATIONS (DEA-RTA) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation 2.3-Cipher Block Modes of operation 2.3-1 Model of Conventional Cryptosystems The following figure, which is on the next page, illustrates the conventional encryption process. The original plaintext is

More information

Lecture 4: Symmetric Key Encryption

Lecture 4: Symmetric Key Encryption Lecture 4: Symmetric ey Encryption CS6903: Modern Cryptography Spring 2009 Nitesh Saxena Let s use the board, please take notes 2/20/2009 Lecture 1 - Introduction 2 Data Encryption Standard Encrypts by

More information

Extended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity

Extended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 Extended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity 26 Nistala V.E.S. Murthy

More information

Modern Symmetric Block cipher

Modern Symmetric Block cipher Modern Symmetric Block cipher 81 Shannon's Guide to Good Ciphers Amount of secrecy should determine amount of labour appropriate for encryption and decryption The set of keys and enciphering algorithm

More information

Geldy : A New Modification of Block Cipher

Geldy : A New Modification of Block Cipher Geldy : A New Modification of Block Cipher Candy Olivia Mawalim (13513031) School of Electrical Engineering and Informatics Institut Teknologi Bandung Jl. Ganesha 10 Bandung 40132, Indonesia 13513031@std.stei.itb.ac.id

More information

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 2009

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 2009 Understanding Cryptography by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 29 These slides were prepared by Daehyun Strobel, Christof

More information

7. Symmetric encryption. symmetric cryptography 1

7. Symmetric encryption. symmetric cryptography 1 CIS 5371 Cryptography 7. Symmetric encryption symmetric cryptography 1 Cryptographic systems Cryptosystem: t (MCKK GED) (M,C,K,K,G,E,D) M, plaintext message space C, ciphertext message space K, K, encryption

More information

Differential Cryptanalysis

Differential Cryptanalysis Differential Cryptanalysis See: Biham and Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag, 1993. c Eli Biham - March, 28 th, 2012 1 Differential Cryptanalysis The Data

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY

FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY Daffodil International University Institutional Repository DIU Journal of Science and Technology Volume,Issue,January 007 007-0-0 FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY

More information

FPGA Based Design of AES with Masked S-Box for Enhanced Security

FPGA Based Design of AES with Masked S-Box for Enhanced Security International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 3 Issue 5ǁ May 2014 ǁ PP.01-07 FPGA Based Design of AES with Masked S-Box for Enhanced Security

More information

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List 1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the

More information

A Modified Playfair Encryption Using Fibonacci Numbers

A Modified Playfair Encryption Using Fibonacci Numbers A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability

More information

L3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015

L3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015 L3. An Introduction to Block Ciphers Rocky K. C. Chang, 29 January 2015 Outline Product and iterated ciphers A simple substitution-permutation network DES and AES Modes of operations Cipher block chaining

More information

A Novel Paradigm for Symmetric Cryptosystem

A Novel Paradigm for Symmetric Cryptosystem A Novel Paradigm for Symmetric Cryptosystem Shadi R. Masadeh Faculty of Information Technology Isra University Amman, Jordan Hamza A. Al_Sewadi King Hussein Faculty of Computing Prince Sumaya University

More information

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

Vortex: A New Family of One-way Hash Functions Based on AES Rounds and Carry-less Multiplication

Vortex: A New Family of One-way Hash Functions Based on AES Rounds and Carry-less Multiplication Vortex: A New Family of One-way Hash Functions Based on AES Rounds and Carry-less ultiplication Shay Gueron 2, 3, 4 and ichael E. Kounavis 1 1 Corresponding author, Corporate Technology Group, Intel Corporation,

More information

A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data

A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 1, Feburary 2014, pp. 93~100 ISSN: 2088-8708 93 A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving

More information

Strict Key Avalanche Criterion

Strict Key Avalanche Criterion Strict Key Avalanche Criterion E Dawson, H Gustafson and A N Pettitt School of Mathematics and Information Security Research Centre Queensland University of Technology GPO Box 2434 Brisbane Qld 4001 Abstract.

More information

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of

More information

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT 1 MANIKANDAN.G, 2 MANIKANDAN.R, 3 RAJENDIRAN.P, 4 KRISHNAN.G, 5 SUNDARGANESH.G 1 Assistant Professor, School of Computing, SASTRA University,

More information

Cryptography: Matrices and Encryption

Cryptography: Matrices and Encryption Cryptography: Matrices and Encryption By: Joseph Pugliano and Brandon Sehestedt Abstract The focus of this project is investigating how to generate keys in order to encrypt words using Hill Cyphers. Other

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

Computer Security 3/23/18

Computer Security 3/23/18 s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks

More information

A New variant of Hill Cipher Algorithm for Data Security

A New variant of Hill Cipher Algorithm for Data Security Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi

More information

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM P. Aatheeswaran 1, Dr.R.Suresh Babu 2 PG Scholar, Department of ECE, Jaya Engineering College, Chennai, Tamilnadu, India 1 Associate

More information

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,

More information